CN104143069B - A kind of method and system of protection system file - Google Patents

A kind of method and system of protection system file Download PDF

Info

Publication number
CN104143069B
CN104143069B CN201410379880.8A CN201410379880A CN104143069B CN 104143069 B CN104143069 B CN 104143069B CN 201410379880 A CN201410379880 A CN 201410379880A CN 104143069 B CN104143069 B CN 104143069B
Authority
CN
China
Prior art keywords
file
deleted
deletion
viewed
disabled
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410379880.8A
Other languages
Chinese (zh)
Other versions
CN104143069A (en
Inventor
耿兴欢
周玲莉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Feixun Data Communication Technology Co Ltd
Original Assignee
Shanghai Feixun Data Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Feixun Data Communication Technology Co Ltd filed Critical Shanghai Feixun Data Communication Technology Co Ltd
Priority to CN201410379880.8A priority Critical patent/CN104143069B/en
Publication of CN104143069A publication Critical patent/CN104143069A/en
Application granted granted Critical
Publication of CN104143069B publication Critical patent/CN104143069B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of method for protecting file, and methods described includes:Set up the deletion disabled listing file of the complete trails filename of a file for including deletion disabled;When system performs deletion action to file to be deleted, the file to be deleted is checked whether in the deletion disabled listing file, if it is, the complete trails filename of the file to be deleted is stored in a deleted-f iotales list, terminates deletion action;If it is not, then deleting the file to be deleted.Technical scheme can be protected to the file for needing deletion disabled, it is to avoid the system file or other vital documents that can not be deleted are deleted by user error, so as to ensure that the stability of system.

Description

A kind of method and system of protection system file
Technical field
The present invention relates to a kind of computer system security, more particularly to a kind of method and system of protection system file.
Background technology
With the popularization and the increase of users ' individualized requirement of modern intelligent terminal so that user is often desirable to that one can be carried out A little personalized operations.Many third-party root instruments are currently there are, these third-party root instruments can allow User carries out root authority operation to the mobile terminal based on android system.The user of android system can be by these Third party root instruments realize the superuser right operation (i.e. root authority is operated) to android system, now, Yong Huyong Have the sovereign power of whole system, all objects he can operate.But due to general user to android system not It is familiar with, when the general user for possessing root authority operation carries out various operations to android system, because general user is unclear Which file of Chu is important system file, it is likely that mistake deletes important system file, and this will cause system to occur Serious failure, usually causes android system cisco unity malfunction or make it that android system can not be just when being again started up Often start.
Same the problem of, exists in other using in the system of linux/Unix kernels.Therefore, super use how is prevented The terminal user of family authority is the deletion of important system file mistake, as a urgent problem to be solved.
The content of the invention
The shortcoming of prior art in view of the above, protects the method for file and is it is an object of the invention to provide a kind of System, terminal user's asking the deletion of important system file mistake of superuser right is possessed for solution in the prior art Topic.
In order to achieve the above objects and other related objects, the present invention provides a kind of method for protecting file, methods described bag Include:Set up the deletion disabled listing file of the complete trails filename of a file for including deletion disabled;In system to be deleted When file performs deletion action, the file to be deleted is checked whether in the deletion disabled listing file, if it is, will The complete trails filename of the file to be deleted is stored in a deleted-f iotales list, terminates deletion action;If it is not, then deleting Except the file to be deleted.
Preferably, methods described be additionally included in system to file directory perform check operation when, under the file directory Each file to be viewed, the file to be viewed is checked whether in the deleted-f iotales list, if it is, not returning The fileinfo to be viewed;If it is not, then returning to the fileinfo to be viewed.
Preferably, the system is included in the operating system based on linux kernel.
Preferably, the operating system based on linux kernel includes android system.
Preferably, the system performs implementing to be included in linux kernel and holding for deletion action to file to be deleted When row arrives virtual file system interface function vfs_unlink, the file to be deleted is checked in vfs_unlink functions whether In deletion disabled listed files, if it is, the complete trails filename of the file to be deleted is stored in into one has deleted text In part list, terminate deletion action;If it is not, then deleting the file to be deleted.
Preferably, the system is the operating system based on linux kernel, and described performed to file directory checks operation Implement including:When virtual file system interface function vfs_readdir is gone in linux kernel, in vfs_readdir The file directory is checked in function whether in deletion disabled listed files, if it is, not returning to the file to be viewed Information;If it is not, then returning to the fileinfo to be viewed.
Preferably, user can change the deletion disabled listing file.
Preferably, the deleted-f iotales list is only existed in internal memory.
The present invention also provides a kind of operating system, and the operating system includes deletion disabled listed files unit and deletion Protection location;The deletion disabled listed files unit is used for the complete trails filename for preserving the file of deletion disabled;It is described to delete Except protection location is connected with the deletion disabled listed files unit, for performing deletion action to file to be deleted in system When, the file to be deleted is checked whether in the file of the deletion disabled, if it is, the complete trails of the file is literary Part name is stored in a deleted-f iotales list, terminates deletion action;If it is not, then deleting the file to be deleted.
Preferably, the operating system also includes display protection location, is connected with the deletion protection location, for being When system checks operation to file directory execution, to each file to be viewed under the file directory, the text to be viewed is checked Whether part is in the deleted-f iotales list, if it is, not returning to the fileinfo to be viewed;If it is not, then returning The fileinfo to be viewed.
As described above, a kind of method and system of protection file of the present invention, have the advantages that:Can be to needing The file of deletion disabled is protected, it is to avoid the system file or other vital documents that can not be deleted are deleted by user error, from And ensure that the stability of system.
Brief description of the drawings
Fig. 1 is shown as a kind of schematic flow sheet of an embodiment of the method for protection file of the present invention.
Fig. 2 is shown as a kind of schematic flow sheet of an embodiment of the method for protection file of the present invention.
Fig. 3 is shown as a kind of schematic flow sheet of an embodiment of the method for protection file of the present invention.
Fig. 4 is shown as a kind of schematic flow sheet of an embodiment of the method for protection file of the present invention.
Fig. 5 is shown as a kind of modular structure schematic diagram of an embodiment of the method for protection file of the present invention.
Fig. 6 is shown as a kind of modular structure schematic diagram of an embodiment of the method for protection file of the present invention.
Component label instructions
1 operating system
11 deletion disabled list cells
12 delete protection location
13 display protection locations
S1~S3 steps
Embodiment
Illustrate embodiments of the present invention below by way of specific instantiation, those skilled in the art can be by this specification Disclosed content understands other advantages and effect of the present invention easily.The present invention can also pass through specific realities different in addition The mode of applying is embodied or practiced, the various details in this specification can also based on different viewpoints with application, without departing from Various modifications or alterations are carried out under the spirit of the present invention.
It should be noted that the diagram provided in the present embodiment only illustrates the basic conception of the present invention in a schematic way, Then only display is painted with relevant component in the present invention rather than according to component count, shape and the size during actual implementation in schema System, it is actual when implementing, and kenel, quantity and the ratio of each component can be a kind of random change, and its assembly layout kenel also may be used Can be increasingly complex.
In order to achieve the above objects and other related objects, the present invention provides a kind of method for protecting file.Referring to Fig. 1 institutes Show, the method for the protection file comprises the following steps:
Step S1, sets up the deletion disabled listing file of the complete trails filename of a file for including deletion disabled.Institute It can be text or data form file etc. to state deletion disabled listing file, in deletion disabled list text In part, the complete trails filename for the file that deletion disabled is needed in the system is stored.The complete trails filename refers to include The filename of file path.For example, in linux system, passwd files are stored in/etc catalogues under, passwd files Complete trails file is entitled/etc/passwd.In a system, the complete trails filename uniquely specifies a file.With Family can will need system file name to be protected all storages and in the deletion disabled listing file, so, these need protection System file can just avoid by user error operation delete.Preferably, user can forbid deleting to described as needed Except listing file is modified, the complete trails filename in remove ban delete list file is specifically included, increases new system-wide Footpath filename etc..
Whether step S2, when system performs deletion action to file to be deleted, check the file to be deleted described In deletion disabled listing file, if it is, the complete trails filename of the file to be deleted is stored in into a deleted document In list, terminate deletion action;If it is not, then deleting the file to be deleted.Specifically, in system to a file to be deleted When performing deletion action, the deletion disabled listing file is opened, and read one by one complete in the deletion disabled listing file Path filename, the complete trails filename of the complete trails filename read and file to be deleted is compared, if both It is identical, then illustrate the file to be deleted in the deletion disabled listing file, by the complete trails text of the file to be deleted Part name is stored in a deleted-f iotales list.Now terminate the reading to the complete trails filename in deletion disabled listing file Take, and the file to be deleted is not deleted really, directly terminate deletion action.If forbidden described in reading one by one Complete trails filename in delete list file, by the complete trails filename read and the complete trails filename of file to be deleted It is compared, it is normal to delete described if all complete trails filenames in the deletion disabled listing file are different from File to be deleted.In order to accelerate the efficiency of system operation, in system operation, system can also be by deletion disabled list text All complete trails filenames in part are read into internal memory, and by all complete trails filename memory-residents, in order to will be described The comparison of complete trails filename and filename to be deleted.
In one embodiment, the system in the protection document method is the operating system based on linux kernel. Include android system in the operating system based on linux kernel.In the operating system based on linux kernel, use Virtual File System (Virtual File System, VFS).VFS is linux kernel Virtual File System framework, for shielding The difference of various file system is covered, other modules provide unified file system operation interface for Linux.For example:vfs_ Unlink is the standard interface for being used in linux kernel Virtual File System VFS delete file.Vfs_readdir is in Linux The standard interface for the file being used in core Virtual File System in Display directory file.In the operating system based on linux kernel In, it can be operated by carrying out certain processing in Linux virtual file system, to realize the deletion of file and automatic extensive It is multiple.In other embodiments, the system in the method for protection file of the invention also includes other operating systems of such as ecos.
In one embodiment, as shown in figure 3, the system in the method for the protection file is based in Linux The operating system of core.Include android system in the operating system based on linux kernel.One is deleted when user performs During the operation of file, linux system will go to virtual file system interface function vfs_unlink.In vfs_unlink letters In number, check this document whether in deletion disabled listing file.If this document is not in deletion disabled listing file, i.e. institute State in deletion disabled listing file and not comprising the file to be deleted, then normal to delete this document, end is deleted to file Division operation.If this document is in deletion disabled listing file, i.e., comprising described to be deleted in described deletion disabled listing file File, then the file path information (the complete trails filename of file i.e. to be deleted) is saved in deleted-f iotales list In, the operation for deleting disk file is not performed, directly returns and deletes successfully, terminate the deletion action to this document.In fact, institute State file not to be deleted really, the file is simply added in deleted-f iotales list by the deletion action to this document. The deleted-f iotales list can be existed only in internal memory, be present in chained list or other modes in internal memory.When having deleted text When part list is existed only in internal memory, after system restarting, the deleted-f iotales list is naturally sky, and system is returned to pair The all not deleted state of all deletion disabled files.The deleted-f iotales list can also be saved in one and login user In related deletion file, now, if system reboot, the user logs in again, reads the deletion file, then can keep it Deleted-f iotales list in the past, certainly, what these files were actually still present.If other users are logged in, then not This document is read, system is returned to all not deleted states of deletion disabled file.
As shown in Fig. 2 in one embodiment, the method for shown protection file not only includes above-mentioned steps S1 and step S2, but also including step S3.Step S3 is:When system performs to file directory and checks operation, under the file directory Each file to be viewed, the file to be viewed is checked whether in the deleted-f iotales list, if it is, not returning The fileinfo to be viewed;If it is not, then returning to the fileinfo to be viewed.Specifically, in system to a file mesh When operation is checked in record execution, to each file (i.e. each file to be viewed) in the file directory of reading, under progress Row operation:By the complete trails filename and deleted-f iotales list of the file (file to be viewed) in the read file directory In complete trails filename compared one by one, if both are identical, illustrate that the file to be viewed has deleted row described In list file.Do not return to the fileinfo to be viewed now, equivalent to the file to be viewed as non-existent file.Will Read the system-wide in the complete trails filename and deleted-f iotales list of the file (file to be viewed) in the file directory Footpath filename is compared one by one, if be different from, and illustrates the file to be viewed not in the delete list file In.Now return to the fileinfo to be viewed, i.e. system and normally get the fileinfo to be viewed.In actual operation In, when this method make it that user checks some catalogue, the file deleted under the catalogue by user is not shown, i.e., to user Speech, is the equal of deleted file.And alternative document is normally shown.
In one embodiment, as shown in figure 4, the system in the method for the protection file is based in Linux The operating system of core.Include android system in the operating system based on linux kernel.One is checked when user performs During the operation of file directory, linux system will go to virtual file system interface function vfs_readdir.In vfs_ In readdir functions, to each file (i.e. each file to be viewed) under the file directory, whether this document is checked In deleted-f iotales list.If this document is not in deleted-f iotales list, i.e., in described deleted-f iotales list not It is comprising the file to be viewed, then normal to show this document.It is if this document is in deleted-f iotales list, i.e., described to have deleted The file to be viewed is included in listed files, then does not return to the information of this document, this document is not shown now.
In specific implement, the step 2 and step 3 can be performed repeatedly, and not need strict implement order, It is not limited with above-described embodiment.In one embodiment, it is automatic to set up empty deleted document row after system starts Table;At this point it is possible to perform step 3 in the case where having not carried out step 2.
The present invention also provides a kind of operating system.In one embodiment, as shown in figure 5, the operating system 1 includes prohibiting Only delete listed files unit 11 and delete protection location 12.
The deletion disabled listed files unit 11 is used for the complete trails filename for preserving the file of deletion disabled.
The deletion protection location 12 is connected with the deletion disabled listed files unit 11, from the deletion disabled file The complete trails filename of the file of all deletion disableds is obtained in list cell.The deletion protection location 12 is used in system pair When file to be deleted performs deletion action, check the file to be deleted whether in the file of the deletion disabled.If it is, The complete trails filename of the file is stored in one in the file of the deletion disabled, then and deleted by the file to be deleted In listed files, terminate deletion action;If not, the file to be deleted is then deleted not in the file of the deletion disabled The file to be deleted.
In one embodiment, as shown in fig. 6, the operating system 1 includes deletion disabled listed files unit 11, deleted Protection location 12 and display protection location 13.
The deletion disabled listed files unit 11 is used for the complete trails filename for preserving the file of deletion disabled.
The deletion protection location 12 is connected with the deletion disabled listed files unit 11, from the deletion disabled file The complete trails filename of the file of all deletion disableds is obtained in list cell.The deletion protection location 12 is used in system pair When file to be deleted performs deletion action, check the file to be deleted whether in the file of the deletion disabled.If it is, The complete trails filename of the file is stored in one in the file of the deletion disabled, then and deleted by the file to be deleted In listed files, terminate deletion action;If not, the file to be deleted is then deleted not in the file of the deletion disabled The file to be deleted.
The display protection location 13 is connected with the deletion protection location 12, is obtained from the deletion protection location 12 Deleted-f iotales list.The display protection location 13 is used for when system performs to file directory and checks operation, to the text Whether each file to be viewed under part catalogue, check the file to be viewed in the deleted-f iotales list.If it is, The file to be viewed does not return to the fileinfo to be viewed in the deleted-f iotales list, then, is not shown to user This document.If not, the file to be viewed does not return to the file letter to be viewed in the deleted-f iotales list, then Breath, this document is normally shown to user.
In various embodiments, operating system of the invention can include the operating system based on linux kernel, such as Android system etc..The operating system of the present invention can also be other operating systems, especially mobile phone operating system.
In summary, a kind of method and system of protection file of the invention, have the advantages that:Can be to needing The file of deletion disabled is protected, it is to avoid the system file or other vital documents that can not be deleted are deleted by user error, from And ensure that the stability of system.So, the present invention effectively overcomes various shortcoming of the prior art and has high industrial profit With value.
The above-described embodiments merely illustrate the principles and effects of the present invention, not for the limitation present invention.It is any ripe Know the personage of this technology all can carry out modifications and changes under the spirit and scope without prejudice to the present invention to above-described embodiment.Cause This, those of ordinary skill in the art is complete without departing from disclosed spirit and institute under technological thought such as Into all equivalent modifications or change, should by the present invention claim be covered.

Claims (8)

1. a kind of method for protecting file, it is characterised in that methods described includes:
Set up the deletion disabled listing file of the complete trails filename of a file for including deletion disabled;
When system performs deletion action to file to be deleted, check the file to be deleted whether in the deletion disabled list In file, if it is, the complete trails filename of the file to be deleted is stored in a deleted-f iotales list, terminate to delete Division operation;If it is not, then deleting the file to be deleted;
When system performs to file directory and checks operation, to each file to be viewed under the file directory, check described Whether file to be viewed is in the deleted-f iotales list, if it is, not returning to the fileinfo to be viewed;If It is no, then return to the fileinfo to be viewed.
2. the method for protection file according to claim 1, it is characterised in that:The system includes being based on linux kernel Operating system in.
3. the method for protection file according to claim 2, it is characterised in that:The operation system based on linux kernel System includes android system.
4. the method for protection file according to claim 2, it is characterised in that:The system is performed to file to be deleted and deleted The implementing of division operation is included in linux kernel when going to virtual file system interface function vfs_unlink, The file to be deleted is checked in vfs_unlink functions whether in deletion disabled listed files, if it is, being treated described The complete trails filename for deleting file is stored in a deleted-f iotales list, terminates deletion action;If it is not, then deleting institute State file to be deleted.
5. the method for protection file according to claim 1, it is characterised in that:The system is based on linux kernel Operating system, it is described to file directory perform check operation implement including:Virtual file system is gone in linux kernel During system interface function vfs_readdir, check the file directory whether in deletion disabled file in vfs_readdir functions In list, if it is, not returning to the fileinfo to be viewed;If it is not, then returning to the fileinfo to be viewed.
6. the method for protection file according to claim 1, it is characterised in that:User can change the deletion disabled row List file.
7. the method for protection file according to claim 1, it is characterised in that:In the deleted-f iotales list is only existed In depositing.
8. a kind of operating system of the method for any one of use claim 1-7 protection file, it is characterised in that:The operation System includes:
Deletion disabled listed files unit, the complete trails filename of the file for preserving deletion disabled;
Protection location is deleted, is connected with the deletion disabled listed files unit, is deleted for being performed in system to file to be deleted During division operation, the file to be deleted is checked whether in the file of the deletion disabled, if it is, by the complete of the file Path filename is stored in a deleted-f iotales list, terminates deletion action;If it is not, then deleting the file to be deleted;
The operating system also includes:
Protection location is shown, is connected with the deletion protection location, it is right for when system performs to file directory and checks operation Each file to be viewed under the file directory, checks the file to be viewed whether in the deleted-f iotales list, If it is, not returning to the fileinfo to be viewed;If it is not, then returning to the fileinfo to be viewed.
CN201410379880.8A 2014-08-04 2014-08-04 A kind of method and system of protection system file Expired - Fee Related CN104143069B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410379880.8A CN104143069B (en) 2014-08-04 2014-08-04 A kind of method and system of protection system file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410379880.8A CN104143069B (en) 2014-08-04 2014-08-04 A kind of method and system of protection system file

Publications (2)

Publication Number Publication Date
CN104143069A CN104143069A (en) 2014-11-12
CN104143069B true CN104143069B (en) 2017-09-29

Family

ID=51852239

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410379880.8A Expired - Fee Related CN104143069B (en) 2014-08-04 2014-08-04 A kind of method and system of protection system file

Country Status (1)

Country Link
CN (1) CN104143069B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104933187B (en) * 2015-07-06 2019-02-01 张兆琦 It is a kind of for operating system or the temporary file management method of application program
CN105095025B (en) * 2015-08-28 2018-11-02 小米科技有限责任公司 Restore the method and device of deleted document in ext file system
CN105045686B (en) * 2015-08-28 2019-03-01 小米科技有限责任公司 File access pattern method and device
CN105930739B (en) * 2016-04-14 2019-07-23 珠海豹趣科技有限公司 A kind of method and terminal for preventing file deleted
CN106778340B (en) * 2016-11-30 2019-07-16 Oppo广东移动通信有限公司 Delet method, device and the mobile terminal of data
CN107153539B (en) * 2017-04-18 2021-03-30 北京思特奇信息技术股份有限公司 File interface system
CN107766549A (en) * 2017-10-31 2018-03-06 珠海市魅族科技有限公司 Text delet method and device, terminal installation and readable storage medium storing program for executing
CN107807985A (en) * 2017-10-31 2018-03-16 珠海市魅族科技有限公司 Multimedia control method and device, terminal installation and computer-readable recording medium
CN108304477A (en) * 2017-12-28 2018-07-20 维沃移动通信有限公司 A kind of document handling method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1719921A (en) * 2004-07-06 2006-01-11 乐金电子(中国)研究开发中心有限公司 Data deleting preventing method for mobile communication terminal
CN101989211A (en) * 2010-11-24 2011-03-23 北京安天电子设备有限公司 Method and system for unloading software
CN102609495A (en) * 2012-01-29 2012-07-25 奇智软件(北京)有限公司 Method for deleting file and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI425375B (en) * 2010-01-20 2014-02-01 Inventec Corp Method of file management of server
US9390109B2 (en) * 2012-12-21 2016-07-12 Commvault Systems, Inc. Systems and methods to detect deleted files

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1719921A (en) * 2004-07-06 2006-01-11 乐金电子(中国)研究开发中心有限公司 Data deleting preventing method for mobile communication terminal
CN101989211A (en) * 2010-11-24 2011-03-23 北京安天电子设备有限公司 Method and system for unloading software
CN102609495A (en) * 2012-01-29 2012-07-25 奇智软件(北京)有限公司 Method for deleting file and system

Also Published As

Publication number Publication date
CN104143069A (en) 2014-11-12

Similar Documents

Publication Publication Date Title
CN104143069B (en) A kind of method and system of protection system file
CN104699423B (en) The method and apparatus that drive is bound in linux system
US9230111B1 (en) Systems and methods for protecting document files from macro threats
US8600947B1 (en) Systems and methods for providing backup interfaces
Zdziarski iPhone forensics: recovering evidence, personal data, and corporate assets
US9658925B1 (en) Systems and methods for restoring application data
CN105391587B (en) The Samba configuring management methods and system of a kind of network equipment
CN103093145B (en) A kind of methods, devices and systems scanning movable storage device
US11062129B2 (en) Systems and methods for enabling search services to highlight documents
CN102646079B (en) Disk data protection method oriented to Linux operating system
CN104035842A (en) Method for deleting and recovering built-in application program
US20090254585A1 (en) Method for Associating Administrative Policies with User-Definable Groups of Files
CN102819717B (en) Method and device for carrying out protection processing on file
CN103389905B (en) Plug-in loading method and system
CN106326129A (en) Program abnormity information generating method and device
CN103617039B (en) Method and device for accessing user space file system
CN107368330A (en) Client patch restorative procedure, device and system
CN107566405B (en) Storage resource pooling method for quick access and copy
CN101950339A (en) Security protection method and system of computer
US9367573B1 (en) Methods and apparatus for archiving system having enhanced processing efficiency
US9020896B1 (en) Systems and methods for simplifying data restoration using resource types
CN103177112B (en) A kind of backup browsing file system
US10311021B1 (en) Systems and methods for indexing backup file metadata
CN102184368A (en) Method for safely using mobile storage device
CN103559204A (en) Database operation request processing method, unit and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PP01 Preservation of patent right
PP01 Preservation of patent right

Effective date of registration: 20180313

Granted publication date: 20170929

PD01 Discharge of preservation of patent
PD01 Discharge of preservation of patent

Date of cancellation: 20210313

Granted publication date: 20170929

PP01 Preservation of patent right
PP01 Preservation of patent right

Effective date of registration: 20210313

Granted publication date: 20170929

PD01 Discharge of preservation of patent
PD01 Discharge of preservation of patent

Date of cancellation: 20240313

Granted publication date: 20170929

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170929